
Chainguard — A Software Supply Chain That’s Secure by Design
In a DevSecOps world, software security depends on every step from commit to production.
Built by the creators of Sigstore and in-toto, Chainguard secures the software supply chain with
cryptographic signing, verifiable provenance (attestations), and policy enforcement.
The platform delivers hardened container images, verifiable provenance, and continuous compliance with
SLSA, NIST 800-218 (SSDF), CIS, and ISO 27001 — giving you confidence that only
verified and trusted code runs in production.
Transparency, Integrity, and Trust — From Code to Production
Chainguard combines best-practice supply chain controls: minimal, continuously verified container images;
signatures and attestations; policy-as-code; and continuous risk monitoring.
Reduce your attack surface, accelerate audits, and meet regulatory demands (e.g., NIS2) without slowing delivery.
Ideal for organizations building on containers and Kubernetes, running mature CI/CD, leveraging open source,
and enforcing Zero Trust across the SDLC.
Key Solutions
1. Chainguard Images
A catalog of secure, minimal (often distroless) container images maintained and continuously verified for CVEs.
Each image ships with a signature (e.g., Sigstore Cosign) and an SBOM.
💡 Value: Dramatically fewer vulnerabilities, a smaller attack surface, and faster base updates.
2. Supply Chain Security Platform
Full visibility of builds, dependencies, and artifacts with cryptographic provenance verification (in-toto/SLSA).
Automatically sign and verify every pipeline step and track who/what/when for critical artifacts.
💡 Value: Integrity guarantees for artifacts and compliance with SLSA level 3+.
3. Automated SBOM & Provenance
Generate and distribute SBOMs (SPDX/CycloneDX) and attestations for every release,
versioned and stored as build artifacts, with CVE and license mapping.
💡 Value: Faster audits and alignment with NIS2, ISO 27001, and customer/regulatory requirements.
4. Policy Enforcement & Continuous Verification
Define and enforce policies that control which images and artifacts are allowed to run.
Require signatures and attestations in Admission Control (e.g., OPA/Gatekeeper, Kyverno) and registries.
💡 Value: Block unverified, tampered, or vulnerable images before they reach production.
5. CI/CD & Cloud Integrations
Ready integrations with GitHub Actions, GitLab CI, Jenkins, Google Cloud Build,
major registries (GHCR, GCR, ECR, ACR), and Kubernetes.
Validate in PR/MR with policy-as-code.
💡 Value: Security built into delivery — without friction for developers.
6. Open-Source Foundations
Built on Sigstore (Cosign, Rekor), in-toto, and SLSA — standards developed with Google and the Linux Foundation.
💡 Value: Transparent, open, community-backed approach aligned with industry best practices.
Why Chainguard
- Secure-by-default — minimal images, smaller attack surface, fewer CVEs.
- Proof of trust — cryptographic signatures, SBOMs, and attestations for every artifact.
- Compliance with SLSA, NIST 800-218 (SSDF), CIS, ISO 27001; supports NIS2 requirements.
- Continuous verification — policies and controls from build through Kubernetes runtime.
- Enterprise-proven — chosen by organizations with stringent regulatory and security needs.
Partner with Us
As an official Chainguard partner, we secure your software supply chain end-to-end — from repositories and pipelines
to registries and production environments. We deploy hardened images, automate SBOM and attestations,
and enforce policies in Admission Control and registries.
Contact us to ensure every deployment is verified, compliant, and resilient — without slowing delivery.
© 2025 In Cloud We Trust (ICWT) — Official Chainguard Partner